Zobrazeno 1 - 10
of 3 288
pro vyhledávání: '"Okafor P"'
Publikováno v:
Journal of Information Systems and Informatics, Vol 6, Iss 2, Pp 1215-1236 (2024)
The Business Intelligence (BI) and Data Warehouse (DW) system deployed in the Nigerian National Petroleum Corporation should provide cooperate decision makers with real-time information to help them identify and understand key business factors to mak
Externí odkaz:
https://doaj.org/article/279b2d007145449a85ffba947915c799
The Thai One-Stage Fingerspelling (One-Stage-TFS) dataset is a comprehensive resource designed to advance research in hand gesture recognition, explicitly focusing on the recognition of Thai sign language. This dataset comprises 7,200 images capturin
Externí odkaz:
http://arxiv.org/abs/2411.02768
The EcoCropsAID dataset is a comprehensive collection of 5,400 aerial images captured between 2014 and 2018 using the Google Earth application. This dataset focuses on five key economic crops in Thailand: rice, sugarcane, cassava, rubber, and longan.
Externí odkaz:
http://arxiv.org/abs/2411.02762
Effective water resource management is crucial in agricultural regions like northeastern Thailand, where limited water retention in sandy soils poses significant challenges. In response to this issue, the Aerial Image Water Resource (AIWR) dataset wa
Externí odkaz:
http://arxiv.org/abs/2411.01797
Autor:
Okafor, Chukwudubem, Herrin, Jacob, Picu, Catalin R., Sewell, Tommy, Brennan, John, Larentzos, James, Udaykumar, H. S.
Meso-scale calculations of pore collapse and hotspot formation in energetic crystals provide closure models to macro-scale hydrocodes for predicting the shock sensitivity of energetic materials. To this end, previous works obtained atomistics-consist
Externí odkaz:
http://arxiv.org/abs/2410.22174
Code signing enables software developers to digitally sign their code using cryptographic keys, thereby associating the code to their identity. This allows users to verify the authenticity and integrity of the software, ensuring it has not been tampe
Externí odkaz:
http://arxiv.org/abs/2406.15596
This paper systematizes knowledge about secure software supply chain patterns. It identifies four stages of a software supply chain attack and proposes three security properties crucial for a secured supply chain: transparency, validity, and separati
Externí odkaz:
http://arxiv.org/abs/2406.10109
Many software products are composed by the recursive integration of components from other teams or external parties. Each additional link in a software product's supply chain increases the risk of the injection of malicious behavior. To improve suppl
Externí odkaz:
http://arxiv.org/abs/2406.08198
Autor:
Fang, Xufei, Zhang, Jiawen, Frisch, Alexander, Preuß, Oliver, Okafor, Chukwudalu, Setvin, Martin, Lu, Wenjun
Publikováno v:
Journal of the American Ceramic Society, 2024
We report room-temperature bulk plasticity mediated by dislocations in single-crystal cubic KTaO3, contrasting the conventional knowledge that single-crystal KTaO3 is susceptible to brittle cleavage. A mechanics-based combinatorial experimental appro
Externí odkaz:
http://arxiv.org/abs/2406.00623
This study introduces and evaluates the Quantile Regressor Tree (QRT), a novel methodology merging the robust characteristics of quantile regression with the versatility of decision trees. The quantile regressor tree introduces non-linearity to the q
Externí odkaz:
http://arxiv.org/abs/2402.14955